Security Experts:

Connect with us

Hi, what are you looking for?



Microsoft Releases Fix It Tool as Attackers Target Internet Explorer Vulnerability

Microsoft pushed out an emergency Fix It tool to close a security vulnerability being exploited in attacks against Internet Explorer 8 and 9.

Microsoft pushed out an emergency Fix It tool to close a security vulnerability being exploited in attacks against Internet Explorer 8 and 9.

So far there have only been a limited number of targeted attacks focused on the issue. According to Microsoft, the vulnerability exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated. The vulnerability could corrupt memory in a way that could permit an attacker to execute code in the context of the current user within IE.

 “This issue could allow remote code execution if an affected system browses to a website containing malicious content directed towards the specific browser type,” blogged Dustin Childs, Group Manager of Response Communications for Trustworthy Computing. “This would typically occur when an attacker compromises the security of trusted websites regularly frequented, or convinces someone to click on a link in an email or instant message. Running modern versions of Internet Explorer ensures that customers receive the benefit of additional security features that can help prevent successful attacks.”

Applying the Microsoft Fix it solution, “CVE-2013-3893 MSHTML Shim Workaround,” prevents the issue from being exploited. In addition, Internet Explorer on Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012 and Windows Server 2012 R2 runs in a restricted mode that mitigates the vulnerability. Also, all supported versions of Microsoft Outlook, Outlook Express and Windows Mail open HTML email messages in the ‘Restricted’ sites zone, which disables script and ActiveX controls.

There’s good news and bad news with this out of band patch, noted Paul Henry, security and forensic analyst at Lumension. The good news is that there are mitigations for the issue. The bad news is that the vulnerability is wide-ranging, affecting multiple versions of Internet Explorer across every operating system from Windows XP to RT, he said.

“And more bad news: the average user is very susceptible to being hit with this,” he said. “The average user does not run the restricted sites mode, are not using the Enhanced Security Configuration and are all-too-willing to click on phishing emails. I recommend employing the mitigating factors listed below, as well as advising users about this so they will be less likely to click malicious links until you can apply the patch. It’s been a while since we’ve seen an out of band patch for IE from Microsoft, but it’s still important to apply it as soon as possible.”

Written By

Click to comment

Expert Insights

Related Content

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.


Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.


Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.